Branch-and-cut methods for the network design problem with vulnerability constraints (Q1652559): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
Normalize DOI.
 
(5 intermediate revisions by 4 users not shown)
Property / DOI
 
Property / DOI: 10.1016/j.cor.2017.10.005 / rank
Normal rank
 
Property / author
 
Property / author: Luís Gouveia / rank
Normal rank
 
Property / author
 
Property / author: Luís Gouveia / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1016/j.cor.2017.10.005 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2765289774 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Using a Hop-Constrained Model to Generate Alternative Communication Network Design / rank
 
Normal rank
Property / cites work
 
Property / cites work: An algorithm for the resource constrained shortest path problem / rank
 
Normal rank
Property / cites work
 
Property / cites work: Partitioning procedures for solving mixed-variables programming problems / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Benders decomposition based framework for solving cable trench problems / rank
 
Normal rank
Property / cites work
 
Property / cites work: On implementing the push-relabel method for the maximum flow problem / rank
 
Normal rank
Property / cites work
 
Property / cites work: Orientation-based models for \(\{0,1,2\}\)-survivable network design: theory and practice / rank
 
Normal rank
Property / cites work
 
Property / cites work: Combinatorial Benders' Cuts for Mixed-Integer Linear Programming / rank
 
Normal rank
Property / cites work
 
Property / cites work: On a measure of communication network vulnerability / rank
 
Normal rank
Property / cites work
 
Property / cites work: An improved Benders decomposition applied to a multi-layer network design problem / rank
 
Normal rank
Property / cites work
 
Property / cites work: Design of survivable networks with vulnerability constraints / rank
 
Normal rank
Property / cites work
 
Property / cites work: Hop constrained Steiner trees with multiple root nodes / rank
 
Normal rank
Property / cites work
 
Property / cites work: The two-level diameter constrained spanning tree problem / rank
 
Normal rank
Property / cites work
 
Property / cites work: Modeling hop-constrained and diameter-constrained minimum spanning tree problems as Steiner tree problems over layered graphs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Design of Survivable Networks: A survey / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5294061 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Integer programming models and branch-and-cut approaches to generalized \(\{0,1,2\}\)-survivable network design problems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Layered graph models and exact algorithms for the generalized hop-constrained minimum spanning tree problem / rank
 
Normal rank
Property / cites work
 
Property / cites work: The complexity of finding two disjoint paths with min-max objective function / rank
 
Normal rank
Property / cites work
 
Property / cites work: Hop‐level flow formulation for the survivable network design with hop constraints problem / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Layered Graph Model and an Adaptive Layers Framework to Solve Delay-Constrained Minimum Tree Problems / rank
 
Normal rank
Property / DOI
 
Property / DOI: 10.1016/J.COR.2017.10.005 / rank
 
Normal rank

Latest revision as of 01:09, 11 December 2024

scientific article
Language Label Description Also known as
English
Branch-and-cut methods for the network design problem with vulnerability constraints
scientific article

    Statements

    Branch-and-cut methods for the network design problem with vulnerability constraints (English)
    0 references
    0 references
    0 references
    0 references
    11 July 2018
    0 references
    networks
    0 references
    integer programming
    0 references
    survivable network design
    0 references
    hop-constraints
    0 references
    OR in telecommunications
    0 references
    Benders decomposition
    0 references
    0 references

    Identifiers